FYI

Next release of capture will be on 1.0.6....you shoudl be able to upgrade
and recompile the server. If someone goes down this route, please share with
the group on whether this went smoothly....

d. VMware VIX Application Programming Interface (API) Memory Overflow
Vulnerabilities

    The VIX API (also known as "Vix") is an API that lets users write
scripts
    and programs to manipulate virtual machines.

    Multiple buffer overflow vulnerabilities are present in the VIX API.
    Exploitation of these vulnerabilities might result in code execution on
    the host system or on the service console in ESX Server from the guest
    operating system.

    The VIX API can be enabled and disabled using the "vix.inGuest.enable"
    setting in the VMware configuration file. This default value for this
    setting is "disabled".  This configuration setting is present in the
    following products:
      VMware Workstation 6.0.2 and higher
      VMware ACE 6.0.2 and higher
      VMware Server 1.06 and higher
      VMware Fusion 1.1.2 and higher
      ESX Server 3.0 and higher
      ESX Server 3.5 and higher
    In previous versions of VMware products where the VIX API was
introduced,
    the VIX API couldn't be disabled.

    The Common Vulnerabilities and Exposures project (cve.mitre.org)
    has assigned the name CVE-2008-2100 to this issue.



-- 
----
Web: http://www.mcs.vuw.ac.nz/~cseifert

PGP key
http://www.mcs.vuw.ac.nz/~cseifert/pgpkey.txt
Primary key fingerprint: E979 0D9A 9187 D821 F86F B712 C8DB 0583 B046 BAEF
_______________________________________________
Capture-HPC mailing list
Capture-HPC@public.honeynet.org
https://public.honeynet.org/mailman/listinfo/capture-hpc

Reply via email to